threat detection
XDR means so much more than some may realize
3 min read
Discover how Cisco XDR redefines security with integrated tools, AI-driven threat detection, and rapid response to solve real-world problems for the SOC
Strengthen Your Security Operations: MITRE ATT&CK Mapping in Cisco XDR
2 min read
Discover how Cisco XDR's MITRE ATT&CK mapping strengthens your security operations. Learn to identify security gaps and improve your cybersecurity posture.
Accessing Secure Client Cloud Management after the SecureX EoL
2 min read
Secure Client Management capabilities aren’t going away with the SecureX EOL, the functionality is simply migrating to the Cisco Security Cloud Control service.
Empowering Cybersecurity with AI: The Future of Cisco XDR
4 min read
Learn how the Cisco AI Assistant in XDR adds powerful functionality to Cisco XDR that increases defenders efficiency and accuracy.
To win against cyber attackers at Super Bowl LVIII, the NFL turns to Cisco XDR
2 min read
Learn how the NFL leveraged Cisco XDR to help secure one of the highest profile and most watched sporting events in the world.
Agniane Stealer: Information stealer targeting cryptocurrency users
7 min read
Agniane Stealer is a malware that targets credentials and documents, actively sold on Telegram, with ConfuserEX obfuscations, presents novel C2 protocol.
Cisco XDR: SLEDs “SOC in a Box”
5 min read
Learn how Cisco XDR simplifies and enhances the operations of SLED-focused SOCs, helping them achieve their security resilience goals.
Introducing Cisco Breach Protection, Delivering Complete Detection and Response of MITRE ATT&CK TTP’s
3 min read
With the increasing complexity of cyberattacks, it's important for SOC teams to have comprehensive coverage of MITRE ATT&CK tactics, techniques, and procedures. Here's how Cisco technology can help you achieve this goal.
The New Normal: How XDR is Tackling Social Engineering in Today’s World
3 min read
Learn how the rise of XDR technology has allowed organizations to better defend themselves against social engineering attacks.
3